ID NO:360684
1. Do you think this event was caused by an insider or outsider? Why do you think this?
A.An insider could have been included, tragically, but unintentionally, by joining an individual usb streak removable commute to the workplace machine to the manager, was contaminated somewhere else with an infection or worm. Be that as it may, all the more than likely the guilty party was a pariah in light of the fact that it was expressed in account that the issues started when the clients clicked their email connections. Also most messages regularly originate from the outside. 2. Other than installing virus and worm control software, what can SLS do to prepare for the next incident? A.They thought to introduce an industrystandard firewall into their frameworks. Really they should have had one effectively, overall this issue would not have happened. Be that as it may I guess they don't have a strong security arrangement set up. Likewise, the way that they were putting in new infection programming lets me know that they either had a shabby one introduced before or that they never had one in any case. 3. Do you think this attack was the result of a virus or a worm? Why do you think this?
A.It would need to be both. An infection can demolish your machine framework and a worm is used to spread it. The way that Amy got a pack of contaminated messages all the while tells me that this is a pulverizing worm that engenders an infection and spreads it quickly through theesends by means of their connections. 1.Would it be ethical for Amy to open such a file?
A.No,it is not ethical for Amy to open because the attacker can hack email and may misuse the information. 2.If such an email came in, what would be the best action to take?
A.It is good to avoid and block such emails.User must also let other people know about such emails. 3. Using the Web, identify the chief information officer (CIO), chief information security officer
(CISCO), and system administrator for your school. Which of these people represent the data owner? Which represent the data custodian?
A.
You May Also Find These Documents Helpful
-
| d. A worm can replicate itself and does not need a host for distribution.…
- 5533 Words
- 23 Pages
Satisfactory Essays -
Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…
- 508 Words
- 3 Pages
Satisfactory Essays -
microbreaks in Africa for some time now. A virus doesn’t usually kill it’s natural host because…
- 2240 Words
- 9 Pages
Better Essays -
• Never download or forward suspicious attachments. Trust only mail from contact list but always be aware messages can become infected.…
- 2175 Words
- 9 Pages
Powerful Essays -
1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…
- 488 Words
- 2 Pages
Satisfactory Essays -
i. When purchasing a Mac you can be sure that it’s secure from any viral threats. The truth is, hardly anyone writes viruses for Macs. The Mac’s…
- 1312 Words
- 6 Pages
Powerful Essays -
• Make sure wiring closets, data centers, and computer rooms are secure. Do no allow anyone access without proper ID.…
- 447 Words
- 2 Pages
Satisfactory Essays -
1) Which of the following is an example of a security threat resulting from malicious human activity?…
- 4641 Words
- 19 Pages
Powerful Essays -
The tools and technologies that could have been used to fix the weaknesses were to upgrade their computers to the latest security system. The computers could had firewalls installed, in order for hackers…
- 285 Words
- 2 Pages
Good Essays -
Tell all external publics to cancel all credit cards, which have been used at Shaw’s stores.…
- 1368 Words
- 6 Pages
Powerful Essays -
2. A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?…
- 787 Words
- 3 Pages
Good Essays -
This security plan is our first. We will take a broad view of the security risks facing the firm and take prompt action to reduce our exposure. Everyone remembers the virus attack we had earlier this year, and we hope to avoid another disaster like that! However, I hope that by taking a wider view, we may be able to plan for threats we don’t know about yet.…
- 2479 Words
- 10 Pages
Powerful Essays -
Colonization- If microorganism is present or invades host, grows and/or multiplies but does not cause infection.…
- 1395 Words
- 6 Pages
Good Essays -
who put the virus into the network and investigate whether or not there was any…
- 1013 Words
- 5 Pages
Better Essays -
3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.…
- 6120 Words
- 25 Pages
Good Essays